You are the network administrator for a company that has decided to start using Windows containers. You download the wrong image from Docker. What command allows you to delete an image? A. docker del B. docker rm C. docker kill D. docker dl
You are the network administrator for a company that has decided to start using Windows containers. You want to create a new container. What command should you use? A. docker create B. docker build container C. docker new D. docker build
You are the network administrator for a company that has decided to start using Windows containers. You have built a number of containers. What PowerShell command allows you to view them? A. docker view B. docker see C. View- Container D. Get- Container
You are the network administrator for a company that has decided to start using Windows containers. You have created some images. What command allows you to see your images? A. docker images B. docker info C. docker view D. docker see
You are the administrator for an organization that has started using containers. You need to build and use a Dockerfile. You want to compile and create an image using the Dockerfile. What command do you use? A. Docker run B. Docker rm C. Docker build D. Docker compile
You are the administrator for an organization that has started using containers. You need to build and use a Dockerfile. You want to execute commands within the Dockerfile. What command should you use? A. Docker run B. Docker rm C. Docker build D. Docker compile
You are the network administrator for a company that has decided to start using Windows containers. You want to delete a container. What PowerShell command allows you to do that? A. docker delete B. docker kill container C. Remove- Container D. Delete- docker- Container
You are the administrator for an organization that has started using containers. You need to build a new image using Windows Server Core. What command would you use to get a Windows Server Core image? A. Docker run microsoft/windowsservercore B. docker pull microsoft/windowsservercore C. Docker build microsoft/windowsservercore D. Docker get microsoft/windowsservercore
You have a Windows Server 2022 server named Server1. Server1 has the Web Server (IIS) server role installed. Server1 hosts an ASP.NET Core web app named WebApp1 and the app’s source files. You install Docker on Server1. You want to ensure that you can deploy WebApp1 to an Azure App Service web app from the Azure Container Registry. Which three actions should you perform in sequence? (Choose three.) A. Run the docker push command. B. Run the docker run command. C. Run the docker build command. D. Create a Dockerfile. E. Run the docker pull command.
How do you add another virtual disk to an Azure virtual machine? A. Use the Virtual Hard Disk Wizard. B. Use the Edit Virtual Hard Disk Wizard. C. Choose Disks from the VM options. D. Use the New Virtual Machine Wizard.
This section explains how to create and manage Azure virtual machines. Setting up an Azure virtual machine is much easier than setting up a server in Hyper-V . When you build a new virtual machine in Hyper- V, you create the virtual machine and then you install the guest operating system. So, if I wanted to create a new Windows Server 2022 VM, I would create the new virtual machine in Hyper- V. Once that is done, I would start the VM and install Windows Server 2022.
When you choose the guest operating system in Azure, the operating system is automatically created after you set your option— no need to install the actual server software. Azure builds the VM exactly as you want it built. You choose the disk size, management options, networking options, advanced options, and then choose to create the VM. Microsoft will give you all the information that you need so that you can remote into the VM. Once you are logged into the VM, you can then work on the server the same way you work on any other VM.
Creating a Virtual Machine in Azure
There’s one very important thing to consider when building virtual machines or anything in Azure: Azure is a consumption- based model. This means the more you use, the more you pay. Be careful. As you are building the VM and see all the available options, be sure to choose only what you need.
When you’re working in Azure, you’re going to feel like a kid in a candy store. Everything they offer looks good and they always try to make you think that you need the extras. But for every extra option that you choose, your monthly charges increase.
Exercise 12.5 will walk you through the process of building a new VM in Azure. We will build a new VM with Windows Server 2022 Datacenter as the guest operating system. The creation process is simple, as Exercise 12.5 demonstrates. If there are any fields that you are not sure about setting, click the information icon (the small circle with an I in the center). This will explain what that option does for your setup.
Choose Deploy A Virtual Machine, as shown in Figure 12.16.
FIGURE 12.16 Deploy a virtual machine
3. We are going to create a new Windows VM. Click the Create button under Create A Windows Virtual Machine (see Figure 12.17).
FIGURE 12.17 Create the Windows VM
4. The Create A Virtual Machine screen opens. On this screen (see Figure 12.18), we can choose which subscription we will add to this VM. You also name your virtual machine (I used WinSrv2022 as my VM name), choose your region, image (the operating system you want to use), admin username and password, and other information. Fill in all the fields and the region. Once all the fields are completed, we can create the VM or we can choose the components for the VM (disks, network, etc.) that we want to set up. We are going to go through each screen, but I will leave the defaults for the rest of my options.
Click the Next: Disks button.
FIGURE 12.18 Create A Virtual Machine page
5. On the Disks page (shown in Figure 12.19), review the disk information. Make any changes for your VM. I am leaving the defaults. After you choose your disk options, click Next: Networking.
FIGURE 12.19 VM Disks page
6. On the Networking page (see Figure 12.20), you can choose your virtual network, IP address, NIC security, and any ports that can connect to this VM. Once you have made your choices, click Next: Management.
FIGURE 12.20 Networking page
7. On the Management page, choose the options that you want set for your VM and then click Next: Monitoring.
8. On the Monitoring page, you can choose to set up alert rules and diagnostic data (see Figure 12.21). Make any changes that you wish and then click Next: Advanced.
FIGURE 12.21 Monitoring page
9. On the Advanced page, you can choose if you want any applications automatically installed, scripts, user settings for accessing the VM, and other VM settings. Choose any additional options and then click Next: Tags.
10. The Tags page will appear. Tags are user- defined key- value pairs that can be directly placed on a resource or a resource group. Azure currently supports up to 50 tags per resource and resource group. Tags may be placed on a resource at the time of creation or added to an existing resource. Once you choose your Tags options, click the Next: Review And Create button.
11. On the Review and Create page, review all the options that you chose. If everything is correct, click Create. The VM will be created (as shown in Figure 12.22).
FIGURE 12.22 Deployment Is In Progress page
12. Once the VM is created, you will see a screen stating that your deployment is complete (as shown in Figure 12.23). Click the Go To Resource button. The VM is built and ready to start. You can start the VM, connect to the guest operating system, and start your server.
FIGURE 12.23 Your Deployment Is Complete
After the virtual machine is created, you will be shown the information for your new Azure virtual server (see Figure 12.24). Make sure you copy or print this information. As part of the information presented, you will be given an IP address so that you can use options like Remote Desktop to make the connection. I will be deleting this VM but I still used xxxx over my private information for this VM.
So now that you have installed Docker on your Windows Server 2022 system, let’s take a look at how to install and configure containers.
In Exercise 12.2, you’ll learn how to make sure your Docker service is started. I will then show you how to install a base operating system image onto your host and how to create Windows Server containers.
There are dozens of premade Docker images. You can look at all of the various Docker components at the Docker Store. Go to https://store .docker.com to see all the available Docker downloads (including premade images).
EXERCISE 12.2
Installing a Base Operating System
Open the Services MMC by clicking Start ➢ Windows Administrative Tools ➢ Services.
Scroll down until you see Docker. Make sure that the Docker Service has started (see Figure 12.5). If it hasn’t started, right- click Docker and choose Start.
FIGURE 12.5 Checking that Docker Service has started
EXERCISE 12.2
3. Close Services.
4. Open PowerShell with administrative privileges by clicking Start and right- clicking Windows PowerShell, then choosing More ➪ Run As Administrator.
5. Now we are going to see if any containers are running. To do this, type docker info in PowerShell and press Enter. You will see a report (see Figure 12.6) that will show you if you have any containers running.
6. So now we are going to install a container image for either Microsoft Nano Server or Windows Server Core from the online package repository. To begin, type one of the following commands into PowerShell (choose the command for the operating system that you want):
7. After your container is installed, restart the Docker service. Type the following command into PowerShell: Restart- Service docker
8. Now let’s take a look at your Docker information again by typing docker info at the PowerShell prompt. As you can see, we now have an image that we didn’t have before (see Figure 12.7).
FIGURE 12.7 Checking Docker information
9. To see all the images that you have on your system, at the PowerShell prompt type docker images (see Figure 12.8).
FIGURE 12.8 Docker images
10. So now that you have seen how to grab a base image from docker, let’s create a Windows Server container with Nano Server installed. At the PowerShell prompt, type the following command:
docker run microsoft/dotnet- samples:dotnetapp- nanoserver
11. If the installation worked properly, you should see what looks like to be a small alien on your screen (see Figure 12.9). Type docker info at the PowerShell prompt and you will see that you now have a container. You will also notice that you have two images now: the one you downloaded earlier and the one you just downloaded.
What is the default TCP port for iSCSI? A. 3260 B. 1433 C. 21 D. 3389
You have a Windows Server 2022 Hyper- V host named Jupiter. You want to deploy several shielded virtual machines on Jupiter. You deploy a Host Guardian on a new server. You need to view the process of the shielded virtual machines installation. What should you run to see the progress of the shielded VM? A. Get- ShieldedVMProvisioningStatus cmdlet B. Diskpart command C. Set- VHD cmdlet D. Set- VM cmdlet
You are the administrator of a mid- sized network. You have a Hyper- V host that runs Windows Server 2022. The host contains a virtual machine named Virtual1. Virtual1 has resource metering enabled. You need to use resource metering to track the amount of network traffic that Virtual1 sends to the 10.10.16.0/20 network. Which cmdlet would you run? A. Add- VMNetworkAdapteiAd B. Set- VMNetworkAdapter C. New- VMResourcePool D. Set- VMNetworkAdapterRoutingDomamMapping
You are the administrator for an organization that has started using Hyper- V. You have a Hyper- V host named Server1 that runs Windows Server 2022. Server1 contains a virtual machine named Earth. You need to make sure that you can use nested virtualization on Earth. What should you run on Server1? A. Mount- VHD cmdlet B. Diskpart command C. Set- VMProcessor cmdlet D. Set- VM cmdlet
You need to ensure that VM1 and VM2 can communicate with each other only. The solution must prevent VM1 and VM2 from communicating with Server1. Which cmdlet should you use? A. Set- NetNeighbor B. Remove- VMSwitchTeamMember C. Set- VMSwitch D. Enable- VMSwitchExtension
You are the admin for a mid- sized company. You have a Hyper- V host named Server1 that runs Windows Server 2022. Server1 has a dynamically expanding virtual hard disk (VHD) file that is 950 GB. The VHD currently contains around 450 GB of free space. You want to reduce the amount of disk space used by the VHD. What command should you run? A. Mount- VHD cmdlet B. Diskpart command C. Set- VHD cmdlet D. Optimize- VHD cmdlet
You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1? A. Find- ServerPackage B. Get- Package C. Find- Package D. Get- WindowsOptionalFeature
You are working on a Windows Server 2022 Datacenter Server system. You need to view which roles and services are installed on the machine. Which PowerShell cmdlet can you use to see this? A. Get- event B. New- event C. Trace- command D. Get- WindowsFeature
What command would be used to register an iSCSI initiator manually to an iSNS server? A. iscsicli refreshisnsserver server_name B. iscsicli listisnsservers server_name C. iscsicli removeisnsserver server_name D. iscsicli addisnsserver server_name
You are an administrator who has set up two Hyper- V servers named Server1 (Windows Server 2022) and Server2 (Windows Server 2012 R2). Each Hyper- V server has multiple network cards. Each network card is connected to a different TCP/IP subnet. Server1 contains a dedicated migration network. Server2 contains a virtual machine named VM1. You plan to perform a live migration of VM1 to Server1. You need to ensure that Server1 uses all of the available networks to perform the live migration of VM1. What should you run to complete this task? A. Mount- VHD cmdlet B. Diskpart command C. Set- VHD cmdlet D. Set- VMHost cmdlet
Your company has decided to implement a Windows 2022 server. The company IT manager before you always used FAT32 as the system partition. Your company wants to know whether it should move to NTFS. Which of the following are some advantages of NTFS? (Choose all that apply.) A. Security B. Quotas C. Compression D. Encryption
You are the administrator of your network, which consists of two Windows Server 2022 systems. One of the servers is a domain controller, and the other server is a file server for data storage. The hard drive of the file server is starting to fill up. You do not have the ability to install another hard drive, so you decide to limit the amount of space everyone gets on the hard drive. What do you need to implement to solve your problem? A. Disk spacing B. Disk quotas C. Disk hardening D. Disk limitations
A system administrator is trying to determine which filesystem to use for a server that will become a Windows Server 2022 file server and domain controller. The company has the following requirements: ■ The filesystem must allow for file- level security from within Windows 2022 Server. ■ The filesystem must make efficient use of space on large partitions. ■ The domain controller SYSVOL must be stored on the partition. Which of the following filesystems meets these requirements? A. FAT B. FAT32 C. HPFS D. NTFS
You are an IT administrator who manages an environment that runs multiple Windows Server 2022 servers from multiple site locations across the United States. Your Windows Server 2022 machines use iSCSI storage. Other administrators report it is difficult to locate available iSCSI resources on the network. You need to make sure other administrators can easily access iSCSI resources using a centralized repository. What feature should you deploy? A. The iSCSI Target Storage Provider feature B. The Windows Standards- Based Storage Management feature C. The iSCSI Target Server role feature D. The iSNS Server service feature
You are the IT manager for your company. You have been asked to give the Admin group the rights to read, change, and assign permissions to documents in the StormWind Documents folder. The following table shows the current permissions on the StormWind Documents shared folder: Group/User NTFS Shared Sales Read Change Marketing Modify Change R&D Deny Full Control Finance Read Read Admin Change Change What do you need to do to give the Admin group the rights to do their job? (Choose all that apply.) A. Give Sales Full Control to shared permissions. B. Give Full Control to NTFS security. C. Give Admin Full Control to shared permissions. D. Give Finance Modify to NTFS security. E. Give Admin Full Control to NTFS security.
Will, the IT manager for your company, has been asked to give Moe the rights to read and change documents in the StormWind Documents folder. The following table shows the current permissions on the shared folder: Group/User NTFS Shared Sales Read Change Marketing Modify Change R&D Deny Full Control Finance Read Read Tylor Read Change Moe is a member of the Sales and Finance groups. When Moe accesses the StormWind Documents folder, he can read all the files, but the system won’t let him change or delete files. What does Will need to do to give Moe the minimum amount of rights to do his job? A. Give Sales Full Control to shared permissions. B. Give Moe Full Control to NTFS security. C. Give Finance Change to shared permissions. D. Give Finance Modify to NTFS security. E. Give Moe Modify to NTFS security.
For security reasons, you have decided that you must convert the system partition on your removable drive from the FAT32 filesystem to NTFS. Which of the following steps must you take in order to convert the filesystem? (Choose two.) A. Run the command CONVERT /FS:NTFS from the command prompt. B. Rerun Windows Server 2022 Setup, and choose to convert the partition to NTFS during the reinstallation. C. Boot Windows Server 2022 Setup from the installation CD-R OM, and choose Rebuild File System. D. Reboot the computer.
You are the administrator of your network, which consists of two Windows Server 2022 systems. One of the servers is a domain controller, and the other server is a file server for data storage. The hard drive of the file server is starting to fill up. You do not have the ability to install another hard drive, so you decide to shrink the data on the file server. What do you need to implement to solve your problem? A. Disk spacing B. Disk compression C. Disk hardening D. Disk limitations
You are the administrator of a large organization. Four weeks ago you have built a new Windows Server 2022 Datacenter Server. You can’t remember all of the roles and features that you previously installed. You need to view which roles and features are installed on the machine. Which PowerShell cmdlet can you use to see this? A. Get- event B. New- event C. Trace- command D. Get- WindowsFeature
What is the default TCP port for RDP? A. 3260 B. 1433 C. 21 D. 3389
On a domain controller, open the Group Policy Management Console.
In the Group Policy Management Console, expand the following path: Forest ➢ Domains ➢ Group Policy Objects. Make sure the domain you choose contains the BranchCache Windows 7/Windows 8 client computer accounts that you want to configure.
In the Group Policy Management Console, right- click Group Policy Objects and select New. Name the policy BranchCache Client and click OK. Right- click BranchCache Client and click Edit. The Group Policy Management Editor console opens.
4. In the Group Policy Management Editor console, expand the following path:
Computer Configuration ➢ Policies ➢ Windows Settings ➢ Security Settings ➢ Windows Firewall With Advanced Security ➢ Windows Firewall With Advanced Security – LDAP ➢ Inbound Rules.
5. Right- click Inbound Rules and then click New Rule. The New Inbound Rule Wizard opens.
6. On the Rule Type screen, click Predefined, expand the list of choices, and then click BranchCache – Content Retrieval (Uses HTTP). Click Next.
7. On the Predefined Rules screen, click Next.
8. On the Action screen, ensure that Allow The Connection is selected and then click Finish. You must select Allow The Connection for the BranchCache client to be able to receive traffic on this port.
9. To create the WS- Discovery firewall exception, right- click Inbound Rules and click New Rule. The New Inbound Rule Wizard opens.
10. On the Rule Type screen, click Predefined, expand the list of choices, and then click BranchCache – Peer Discovery (Uses WSD). Click Next.
11. On the Predefined Rules screen, click Next.
12. On the Action screen, ensure that Allow The Connection is selected and then click Finish.
13. In the Group Policy Management Editor console, right- click Outbound Rules and then click New Rule. The New Outbound Rule Wizard opens.
14. On the Rule Type screen, click Predefined, expand the list of choices, and then click BranchCache – Content Retrieval (Uses HTTP). Click Next.
15. On the Predefined Rules screen, click Next.
16. On the Action screen, make sure that Allow The Connection is selected and then click Finish.
17. Create the WS- Discovery firewall exception by right- clicking Outbound Rules and then clicking New Rule. The New Outbound Rule Wizard opens.
18. On the Rule Type screen, click Predefined, expand the list of choices, and then click BranchCache – Peer Discovery (Uses WSD). Click Next.
19. On the Predefined Rules screen, click Next.
20. On the Action screen, make sure that Allow The Connection is selected and then click Finish. Close the Group Policy Management console.
Now that you have looked at the distributed cache mode configuration, let’s take a look at the hosted mode configuration.
Hosted Mode Requirements
To set up a hosted mode BranchCache configuration, you must first set up a Windows Server 2022 hosted cache server at the main and branch offices. You also need to be running Windows 7 or above (except for home versions) at the branch offices.
The Windows client machines download the data from the main cache server, and then the hosted cache servers at the branch offices obtain a copy of the downloaded data for other users to access.
Your network infrastructure must also allow for physical connections between the main office and the branch offices. These connections can be VPNs or some type of WAN links. After these requirements are met, your cache server must obtain a server certificate so that the client computers in the branch offices can positively identify the cache servers.
Exercise 11.17 walks you through the process of installing the BranchCache feature on a Windows Server 2022 machine. To begin this exercise, you must be logged into the Windows Server 2022 machine as an administrator.
EXERCISE 11.17
Installing BranchCache on Windows Server 2022
Open Server Manager by clicking the Server Manager icon or by running server manager.exe.
Select Add Roles And Features.
Click Next in the Before You Begin pane (if shown).
Select role- based or feature- based installation and click Next to continue.
Select the Select A Server From The Server Pool option and click Next.
At the Select Server Roles screen, click Next.
At the Select Features screen, click the check box for BranchCache (see Figure 11.26). Then click Next.
FIGURE 11.26 BranchCache option
8. Check the Restart The Destination Server If Required option and then click Install. If a dialog box appears about restarting, click Yes. The system should restart.
9. After the system restarts, log in as the administrator.
In previous versions of BitLocker (Windows Vista and Windows 7), BitLocker provisioning (system and data volumes) was completed during the post installation of the BitLocker utility. BitLocker provisioning was done through either the command-l ine interface (CLI) or Control Panel. In the Windows 8+ /Windows Server 2022 version of BitLocker, you can choose to provision BitLocker before the operating system is even installed.
You can enable BitLocker prior to the operating system deployment from the Windows Preinstallation Environment (WinPE). BitLocker is applied to the formatted volume, and BitLocker encrypts the volume prior to running the Windows setup process.
If you want to check the status of BitLocker on a particular volume, you can view the status of the drive either in the BitLocker Control Panel applet or in Windows Explorer.
Used Disk Space–Only Encryption
Windows 7 BitLocker requires that all data and free space on the drive must be encrypted.
Because of this requirement, the encryption process can take a long time on larger volumes. In Windows 10+ BitLocker, you have the ability to encrypt either the entire volume or just the space being used. When you choose the Used Disk Space Only option, only the section of the drive that contains data will be encrypted. Because of this, encryption is completed much faster.
Standard User PIN and Password Change
One issue that BitLocker has had in the past is that you need to be an administrator to configure BitLocker on operating system drives. This could become an issue in a large organization because deploying TPM + PIN to a large number of computers can be challenging.
Even with the new operating system changes, administrative privileges are still needed to configure BitLocker, but now your users have the ability to change the BitLocker PIN for the operating system or change the password on the data volumes.
When a user gets to choose their own PIN and password, they normally choose something that has meaning to them and something that is easy to remember. That is a good and a bad thing at the same time. It’s a good thing because when your users choose their own PIN and password, they normally don’t need to write it down—t hey just know it. It’s a bad thing because if anyone knows the user well, they can have an easier time figuring out the person’s PIN and password. Even when you allow your users to choose their own PIN and password, make sure you set a GPO to require password complexity.
Network Unlock
One of the features of BitLocker is Network Unlock. Network Unlock allows you to easily manage desktops and servers that are configured to use BitLocker. Network Unlock allows you to configure BitLocker to automatically unlock an encrypted hard drive during a system reboot when that hard drive is connected to your trusted corporate environment. For this to function properly on a machine, there has to be a DHCP driver implementation in the system’s firmware.
If your operating system volume is also protected by the TPM + PIN protection, you have to be sure to enter the PIN at the time of the reboot. This protection can actually make using Network Unlock more difficult to use, but they can be used in combination.
Support for Encrypted Hard Drives for Windows
One of the new advantages of using BitLocker is Full Volume Encryption (FVE). BitLocker provides built- in encryption for Windows data files and Windows operating system files. The advantage of this type of encryption is that encrypted hard drives that use Full Disk Encryption (FDE) get each block of the physical disk space encrypted. Because each physical block gets encrypted, it offers much better encryption. The only downside to this is that because each physical block is encrypted, it degrades the hard drive speed somewhat. So, as an administrator, you have to decide whether you want better speed or better security on your hard disk.
In Exercise 11.12, you will enable BitLocker on the Windows Server 2022 system.
EXERCISE 11.12
Enabling BitLocker in Windows Server 2022
Open Server Manager by clicking the Server Manager icon or running server manager.exe.
Select Add Roles And Features from the dashboard.
Select Next in the Before You Begin pane (if shown).
Select role- based or feature- based installation and click Next to continue.
Select the Select A Server From The Server Pool option and click Next.
At the Select Server Roles screen, click Next.
At the Select Features screen, click the BitLocker Drive Encryption check box. When the Add Roles and Features dialog box appears, click the Add Features button. Then click Next.
Click the Install button in the Confirmation pane of the Add Roles And Features Wizard to begin BitLocker feature installation. The BitLocker feature requires a restart to complete. Selecting the Restart The Destination Server Automatically If Required option in the Confirmation pane will force a restart of the computer after installation is complete.
If the Restart The Destination Server Automatically If Required option is not selected, the Results pane of the Add Roles And Features Wizard will display the success or failure of the BitLocker feature installation. If required, a notification of additional action necessary to complete the feature installation, such as the restart of the computer, will be displayed in the results text.
You also can install BitLocker by using the Windows PowerShell utility. To install BitLocker, use the following PowerShell commands:
If you have been in the computer industry long enough, you may remember the days when only servers used NTFS. Years ago, most client systems used FAT or FAT32, but NTFS had some key benefits over FAT/FAT32. The main advantages were NTFS security, quotas, compression, and encryption. Encryption is available on a system because you are using a file structure (for example, NTFS) that allows encryption. Windows Server 2022 NTFS allows you to use these four advantages, including encryption.
Encrypting File System (EFS) allows a user or administrator to secure files or folders by using encryption. Encryption employs the user’s security identification (SID) number to secure the file or folder. Encryption is the strongest protection that Windows provides to help you keep your information secure. Some key features of EFS are as follows:
■Encrypting is simple; just select a check box in the file or folder’s properties to turn it on.
■You have control over who can read the files.
■Files are encrypted when you close them but are automatically ready to use when you open them.
■If you change your mind about encrypting a file, clear the check box in the file’s properties.
To implement encryption, open the Advanced Attributes dialog box for a folder and check the Encrypt Contents To Secure Data option.
If files are encrypted using EFS and you have to unencrypt the files, there are two ways you can do this. You can log in using the user’s account (the account that encrypted the files) and unencrypt the files using the cipher command. Alternatively, you can become a recovery agent and manually unencrypt the files.
To install data duplication, you have two ways to choose from. You can install data duplication through Server Manager or through PowerShell. Let’s take a look at each way. To install data deduplication by using Server Manager:
On the Windows Server 2022 system, open Server Manager.
Click the Add Roles And Features link.
At the Before You Begin screen, click Next.
At the Select Installation Type screen, choose role- based or feature- based installation and then click Next.
Choose the server where you want to install Data Duplication and click Next.
On the Select Server Roles screen, select File and Storage Services ➢ File And iSCSI Services and then select the Data Deduplication option (shown in Figure 11.17). Click Next.
Click Next at the Selected Features screen.
Click the Install button once you’ve confirmed that all options are correct.
Once completed, close Server Manager.
Understanding Data Duplication
FIGURE 11.17 Selecting Data Deduplication
To install data deduplication by using PowerShell:
Click the Start button, then click Windows PowerShell ➢ More ➢ Run As Administrator.
In the Windows PowerShell console, enter the following commands (one at a time) followed by the Enter key: Import- Module ServerManager
Add- WindowsFeature – name FS- Data- Deduplication
Import- Module Deduplication
After you have installed data duplication, you must then enable it on the servers. To enable data duplication in Server Manager, you would need to complete the following steps:
In Server Manager, click File And Storage Services.
Click Volumes. On right side, click the volume where you want to set up Data Duplication. Right- click the volume and choose Configure Data Deduplication (see Figure 11.18).
FIGURE 11.18 Enabling Data Deduplication
3. The New Volume Deduplication Settings Wizard will start. From the Data Deduplication pull- down, choose General Purpose File Server (shown in Figure 11.19). Enter the number of days that should elapse from the date of file creation until files are deduplicated (I used 3 days), enter the extensions of any file types that should not be duplicated (I used .exe), and then click Add to browse to any folders with files that should not be deduplicated ( I included \test share). Click OK once completed. You can also set a deduplication schedule by clicking the Set Deduplication Schedule button.
Monitoring Data Deduplication
Finally, after data deduplication is installed and configured, you will want to monitor the progress of the data deduplication jobs. To do this, you can run the following PowerShell commands (these commands will show you the status of the duplication process):